Western Illinois University, USA.
World Journal of Advanced Research and Reviews, 2025, 26(02), 450-457
Article DOI: 10.30574/wjarr.2025.26.2.1662
Received on 27 March 2025; revised on 03 May 2025; accepted on 05 May 2025
Zero Trust architecture represents a fundamental shift in securing cloud infrastructure, particularly within CI/CD pipelines where traditional perimeter-based security approaches increasingly fail against sophisticated threats. This technical article explores how implementing Zero Trust principles—"never trust, always verify"—creates robust protection throughout the software delivery lifecycle. The implementation spans across multiple dimensions: securing modern CI/CD tools including GitHub Actions, Azure DevOps, and GitLab; establishing comprehensive identity and access management with just-in-time privileged access; leveraging PowerShell for security automation; and ensuring robust container security across Docker and Kubernetes environments. Each dimension contributes to a defense-in-depth strategy that addresses the unique challenges of cloud-native environments. The article demonstrates how explicit verification of all access requests, regardless of origin, combined with fine-grained permissions, continuous monitoring, and automated compliance validation creates significantly enhanced security postures. For organizations undergoing digital transformation with automated software delivery pipelines, adopting these Zero Trust methodologies ensures application integrity throughout the development lifecycle while maintaining the agility benefits that make cloud environments valuable in the first place.
Zero Trust Architecture; CI/CD Security; Cloud Infrastructure; Container Orchestration; Identity Management
Preview Article PDF
Sumanth Kadulla. Zero trust in cloud infrastructure: Implementing secure CI/CD Pipelines. World Journal of Advanced Research and Reviews, 2025, 26(2), 450-457. Article DOI: https://doi.org/10.30574/wjarr.2025.26.2.1662